esp

Results 1 - 25 of 3201Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Feb 06, 2020
Industry momentum remains high for SAP HANA; however, lack of SAP HANA development skills and virtualization limits is curtailing widespread adoption. Infrastructure and operations leaders should select their SAP HANA vendors based on project maturity, market share, system size and virtualization.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Feb 06, 2020
This study provides IDC's top 10 predictions for small and medium sized businesses (SMBs) in 2020 and beyond. The predictions are designed to provide senior managers and IT decision makers with a call to action investment plan with respect to critical technologies
Tags : 
    
Hewlett Packard Enterprise
Published By: F5 Networks Singapore Pte Ltd     Published Date: Dec 02, 2019
APIs have grown tremendously in recent years As you expand your organization’s API footprint, how do you scale your technology, people, processes, and governance? What kind of guidelines should you provide for designing, implementing, and deploying APIs in your organization? This ebook provides answers to these critical questions. This is a must-have book for technical practitioners as well as professionals responsible for an enterprise’s API business strategy. It sheds light on the critical business elements of delivering APIs—from establishing drivers for building them to deploying, operationalizing, refining, and evolving them continually at scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Google     Published Date: Feb 11, 2020
"Migrating to the cloud can be complex, time consuming, and risky, especially when you have hundreds or thousands of existing workloads to move. Make your journey fast and smooth by planning ahead and using tried and tested best practices. This 4-step guide from Google Cloud also includes a detailed checklist of key milestones, ensuring that you complete every step and always know what’s next."
Tags : 
    
Google
Published By: Workday     Published Date: Feb 17, 2020
"Tackle the period close with confidence. Mastering finance’s traditional responsibilities is essential to becoming a more strategic partner to the business. By following the 10 steps in this guide, you can achieve a more efficient and accurate consolidation and close process that frees you up to focus on what really matters. Read now to learn how to: • Effectively prepare data for a smoother close • Generate meaningful reports that provide data-driven insights • Leverage a single system to boost efficiency and transparency"
Tags : 
    
Workday
Published By: HashiCorp Q1-20     Published Date: Jan 17, 2020
Cloud adoption is a secular trend. Organizations undergoing a digital transformation ultimately put pressure on teams delivering and supporting software applications. Digital experiences are the primary interface between customers and businesses; even businesses selling to other businesses. Modern digital interactions are responsively designed and built cloud-first to provide rich, personalized experiences informed by large scale data processing and intelligence as quickly as possible. This pattern of prioritizing digital interactions forces a change in the model for software delivery and is felt most by IT, with a strong dependency on that team to build an organization-wide operating model for delivering cloud based applications.
Tags : 
    
HashiCorp Q1-20
Published By: Zinier APAC     Published Date: Feb 26, 2020
"Smart machines are everywhere – in our homes, our driveways, even our power grids and assembly lines. Over the last three years, the number of connected devices has almost doubled, from 15 billion in 2015 to more than 25 billion today. By 2025, that number is expected to eclipse 75 billion. At the same time, wireless data traffic has seen explosive growth. In the United States, mobile data usage increased 54% over the last decade (Mobility Report. Ericsson, 2018). The rise of IoT-connected devices and increasing customer expectations around mobile broadband performance is putting tremendous pressure on existing infrastructure. In response, telecom companies are making massive capex investments in small cell networks."
Tags : 
    
Zinier APAC
Published By: Delta Risk     Published Date: Jan 30, 2020
Although the benefits of moving to the cloud are clear, it presents new and unique security challenges. While cloud provider platforms are generally secure, each organization is ultimately responsible for properly configuring their own security controls to protect their data, applications, and cloud infrastructure.
Tags : 
    
Delta Risk
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Jun 10, 2019
Digital disruption, economic instability, political upheavals and skills shortages have all at some point in the past 24 months been blamed for business failure, or at the very least, lost profitability and earnings. It’s perhaps not a huge surprise that a Gartner CEO survey on business priorities revealed that digital business is a top priority for next year. Survey respondents were asked whether they have a management initiative or transformation program to make their business more digital. The majority (62 percent) said they did. Of those organisations, 54 percent said that their digital business objective is transformational while 46 percent said the objective of the initiative is optimisation.* So, for businesses it’s a case of learning to evolve and be agile, to use technology to help compete more efficiently and not fall victim to inertia. As businesses become increasingly dependent on the insights from data analytics and face-up to competition fuelled by the 24/7 society of in
Tags : 
    
Infinidat EMEA
Published By: Forcepoint     Published Date: Feb 03, 2020
When it comes to data security, the best-case scenario is to prevent data from being compromised entirely. However, as any security team knows, blocking every threat can impede workflows and productivity across a company. But it doesn’t have to be this way. This infographic outlines the nine steps you can take today to guard against data security incidents in the future while giving employees the freedom to get their work done efficiently. Download to learn how to: • Identify and categorize risks to your data security • Proactively define responses before incidents arise • Integrate data loss prevention controls across your business
Tags : 
    
Forcepoint
Published By: ttec     Published Date: Feb 05, 2020
As customer service organizations grow more complex, the day-to-day work of a contact center agent will change. Automation will tackle simple, repetitive tasks; agents will need different skills to handle more complex requests. This report helps contact center leaders understand how they need to hire a different type of workforce as AI, automation, and the changing nature of contact center work impact agent responsibilities, metrics, and performance — and what that means for customer experiences in the futur
Tags : 
    
ttec
Published By: M-Files     Published Date: Feb 24, 2020
Accounting firms are increasingly turning to information management technology to streamline and future-proof their operation. Validation of key technologies by respected third-party analysts like Gartner are an indispensable tool for accounting firms that are reviewing cornerstone technology — in this case Content Services Platforms (CSP). In the 2019 Gartner Magic Quadrant for Content Services Platforms (CSP), you'll find: • A comprehensive snapshot of the CSP market • Forward-looking market overview and analysis of the future of enterprise content management • Unbiased vendor analysis of the top 18 platforms with strengths and weaknesses • Actionable evaluation criteria for potential buyers M-Files has been named a Visionary in the 2019 Gartner Magic Quadrant, and that's exciting but more important is the information contained in the report. The foundation of digital transformation lies in the ability to manage your accounting firm's ever-growing store of information. How can these
Tags : 
    
M-Files
Published By: M-Files     Published Date: Feb 24, 2020
Consulting firms are increasingly turning to information management technology to streamline and future-proof their operation. Validation of key technologies by respected third-party analysts like Gartner are an indispensable tool for business consultancies that are reviewing cornerstone technology — in this case Content Services Platforms (CSP). In the 2019 Gartner Magic Quadrant for Content Services Platforms (CSP), you'll find: • A comprehensive snapshot of the CSP market • Forward-looking market overview and analysis of the future of enterprise content management • Unbiased vendor analysis of the top 18 platforms with strengths and weaknesses • Actionable evaluation criteria for potential buyers M-Files has been named a Visionary in the 2019 Gartner Magic Quadrant, and that's exciting but more important is the information contained in the report. The foundation of digital transformation lies in the ability to manage your company's ever-growing store of information. How can these C
Tags : 
    
M-Files
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Velaro     Published Date: May 06, 2014
Did you know that those who respond to a proactive online chat invitation are 6 times more likely to buy than the average website visitor? Download this paper for practical advice on using proactive chat to increase sales online sales and customer satisfaction.
Tags : 
live chat, live chat software, proactive live chat, online sales conversions, ecommerce, online customer experience, customer support productivity, online sales, enterprise applications
    
Velaro
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Engagio     Published Date: Feb 11, 2020
The world of modern B2B marketing is being driven increasingly by personalization. Every buyer at a company has expectations that are informed by their B2C experiences, such as their recommended shows on Netflix or their recommended playlists on Spotify. Every buyer wants a seamless experience as they go through the buying process, and they want it to be bespoke -- tailored specifically to them, their interests, and their needs. But how do you provide this experience for all of your target accounts? The answer lies in orchestration. Orchestration is the coordination of activities, programs and campaigns across the entire revenue team. This empowers revenue teams to design and automate high-impact account-based plays across channels such as advertising, sales engagement, marketing automation, direct mail, and CRM.
Tags : 
    
Engagio
Published By: ASG Software Solutions     Published Date: Jun 24, 2008
As IT evolves towards a more business-aligned position, it must seek out new ways of working that support more effective operations, service creation, and service delivery. These include technologies, processes, and a culture that supports higher levels of accountability, as well as more dynamic responsiveness to business needs.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jul 28, 2008
Targeted at IT executives responsible for both the financial and ultimate project oversight of an enterprise CMDB initiative, this white paper sets expectations for ROI calculations for CMDB initiatives, provides basic ROI best practices, and gives readers sufficient insight to move forward with their CMDB project.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, roi, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, business risk
    
Nuance Communications
Published By: 123Together     Published Date: Mar 17, 2009
With the current state of the economy, IT executives are being asked to stretch their budgets in order to keep their businesses profitable. In 2008, Median IT spending per user fell to $6,667 from the previous year's $7,397, according to Computer Economics. This represents a 6.2% reduction, consistent with the fact that IT managers were supporting an increasing number of users without corresponding increases in IT spending. IT spend continued to decline in 2009 and uncertainty and caution is still prevalent in 2010.
Tags : 
123together, it strategies, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: Neolane, Inc.     Published Date: Nov 17, 2010
Marketing is evolving and B2B Marketers that fail to embrace this change will become irrelevant. While shocking to some, this perspective is not new; it's simply becoming increasingly apparent to the B2B marketing community.
Tags : 
neolane, b2b, marketing, sirius, analytics, sales 2.1, tlbm, respondents, qualified
    
Neolane, Inc.
Published By: WhatCounts     Published Date: Apr 30, 2010
There's no reason overseeing and managing a million-plus subscriber email database should be a discombobulated and overbearing task. Start being an effective email marketer by creating a plan, brushing up on your skills, and cleaning house. Implementing these six simple tweaks will go a long way towards maximizing the return, response, and revenue from your email program.
Tags : 
whatcounts, email marketing, subscriber lists, email database, databasing
    
WhatCounts
Published By: Cantaloupe     Published Date: Mar 30, 2010
The hype about video search has just begun which means lots of questions, lots of new experts, and not enough time to sort through it all. This new whitepaper "An Effective Video SEO Strategy in Three Phases" will give you the blueprint for getting started and beyond. Learn all about: the 2 things you should be doing right now to improve your video search engine optimization; widespread myths about what works and what doesn't; Advanced tips for even greater results and more!
Tags : 
cantaloupe, online video, social media, search, communication, facebook, twitter, seo, engagement
    
Cantaloupe
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.